Overview
The Microsoft GDI contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.
Description
The Graphics Device Interface (GDI) is component of the Microsoft Windows user interface. Windows Metafile (WMF) and Enhanced Metafile (EMF) are image file formats primarily used by the Windows operating system. Per Microsoft Security Bulletin MS08-021: |
Impact
By convincing a user to view a malicious image a remote, unauthenticated attacker may be able to execute arbitrary code. Note that Internet Explorer, in its default configuration, can automatically launch the Windows Picture and Fax Viewer as the result of viewing a web page and may be used as an attack vector. |
Solution
Upgrade |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/bulletin/ms08-021.mspx
- http://www.kb.cert.org/vuls/id/181038
- http://www.symantec.com/enterprise/security_response/weblog/2008/04/attempt_at_exploiting_latest_g.html
- http://en.wikipedia.org/wiki/Enhanced_Metafile
- http://en.wikipedia.org/wiki/Graphics_Device_Interface
Acknowledgements
Microsoft credits Jun Mao, Sebastian Apelt, Thomas Garnier, and Yamata Li for reporting this vulnerability.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2008-1083 |
Severity Metric: | 45.00 |
Date Public: | 2008-04-08 |
Date First Published: | 2008-04-11 |
Date Last Updated: | 2008-04-11 16:23 UTC |
Document Revision: | 11 |